First published: Mon Sep 21 2015(Updated: )
A vulnerability was found allowing users who have access to write cookie values were able to inject headers into the response. Versions affected are all versions Plone 3. Upstream hotfix: <a href="https://plone.org/security/20150910/">https://plone.org/security/20150910/</a> CVE request: <a href="http://seclists.org/oss-sec/2015/q3/589">http://seclists.org/oss-sec/2015/q3/589</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plone Plone | =3.3 | |
Plone Plone | =3.3.1 | |
Plone Plone | =3.3.2 | |
Plone Plone | =3.3.3 | |
Plone Plone | =3.3.4 | |
Plone Plone | =3.3.5 | |
Plone Plone | =3.3.6 | |
pip/Plone | >=3.3<4.0a1 | 4.0a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7318 is considered a moderate severity vulnerability due to its potential for header injection and impact on security.
To fix CVE-2015-7318, upgrade to Plone version 4.0a1 or later.
All versions of Plone from 3.3 to 3.3.6 are affected by CVE-2015-7318.
Yes, CVE-2015-7318 can potentially lead to unauthorized header injection that may compromise user sessions.
There is no official workaround for CVE-2015-7318; the recommended action is to upgrade to a secure version.